Author of the publication

A generalisation of Dillon's APN permutation with the best known differential and linear properties for all fields of size 24k+2.

, , and . IACR Cryptology ePrint Archive, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design Strategies for ARX with Provable Bounds: SPARX and LAX (Full Version)., , , , , and . IACR Cryptology ePrint Archive, (2016)State of the Art in Lightweight Symmetric Cryptography., and . IACR Cryptology ePrint Archive, (2017)If a Generalised Butterfly is APN then it Operates on 6 Bits., , and . IACR Cryptology ePrint Archive, (2018)On CCZ-Equivalence, Extended-Affine Equivalence, and Function Twisting., and . IACR Cryptology ePrint Archive, (2018)The Secret Structure of the S-Box of Streebog, Kuznechik and Stribob., , and . IACR Cryptology ePrint Archive, (2015)Cryptanalysis of Feistel Networks with Secret Round Functions., , and . SAC, volume 9566 of Lecture Notes in Computer Science, page 102-121. Springer, (2015)Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1., , and . EUROCRYPT (1), volume 9665 of Lecture Notes in Computer Science, page 372-402. Springer, (2016)Collision Spectrum, Entropy Loss, T-Sponges, and Cryptanalysis of GLUON-64., and . FSE, volume 8540 of Lecture Notes in Computer Science, page 82-103. Springer, (2014)Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE., and . FSE, volume 9054 of Lecture Notes in Computer Science, page 190-216. Springer, (2015)On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure., and . CRYPTO (1), volume 9215 of Lecture Notes in Computer Science, page 116-140. Springer, (2015)